naruwanformosa

Thursday, December 6, 2012

God is the most righteous and perfect, he created this earth
beings with deficiency and excess, deficiency and excess that make we
should be very thankful to god. neither does the animals, some animals
such as elephant, buffalo, etc., they can protect themselves from his
enemy using his strength. then what about a small animal? they also can
protect themselves with the strengths of each, even deadly.

below are these animals:
9. Tick
Fleas eat blood and attach themselves to other animals (including
humans). They can be difficult to remove and removal should be done with
caution because they can leave their head which can lead to serious
infections. According to Wikipedia, hard ticks (hard ticks) can transmit
human diseases such as Lyme disease, Rocky Mountain fever, tularemia,
equine encephalitis, Colorado tick fever, African Tick Bite Fever, and
several forms of ehrlichiosis.
8. Tarantula Hawk
Tarantula Hawk is named after the fact that they hunt tarantulas as
their larval food. Their sting is rated as one of the most painful in
the world (although it does not hurt like a bullet ant). One researcher
described the “[...] as a direct cause shock, excruciating pain that
simply shuts down one’s ability to do anything, except, perhaps, scream.
Mental discipline just does not work in this situation.” Tarantula Hawk
is the ‘official insect’ the state of New Mexico. had a great title
“OFFICIAL INSECTS”
7. Tsetse Flies
The fly is a large biting flies that eat the blood of African
vertebrates. They are known to cause disease in humans and Nagana Sleep
in cattle. Sleeping sickness is a parasitic disease in humans and
animals caused by Trypanosoma, a protozoan that is transmitted by the
tsetse fly. Symptoms of sleeping sickness begins with a fever and
headache and swelling at the back of the neck. After that, the victim
may experience daytime sleep and insomnia. This can lead to death
afterwards.
6. Africanized Bees
Bees are also called killer bees, and are descended from 26 Tanzanian
queen bees are bred with other species after they accidentally released
from the nest in Brazil. What makes bees deadly is their defensive
nature and tendency to huddle. In addition, they tend to follow the
victim even when it was far from the nest. This aggressiveness when
attacking ensure potential threats painful death for the victim.
5. Deathstalker
It is a species of scorpion is very dangerous because the poison.
Poison is actually a mixture of powerful neurotoxins. Although, the
poison will not kill a healthy adult, can be fatal for children and the
elderly. Ironically, the toxic component (peptide chlorotoxin) has the
potential to cure human brain tumors, while other toxins may help fight
diabetes.
4. Black Widow
Spider is one of the most famous species, especially as the poison
that can be fatal to humans. The poison is said to be stronger than a
rattlesnake. Males and females have an hourglass-shaped mark on their
lower abdomen. Females are larger than males relative and contrary to
popular belief, females rarely eat males after mating.
3. Army Ants
They are found in Africa and Asia and they build nests while on the
go. The greatest risk to human ant is when they ran through the house.
When food supplies are low, these ants will gather in sizes up to 50
million ants. There are reports that people are usually killed with him
shortness of breath (ants will frequently enter into the lungs).
Mandible they are so strong that in some parts of Africa they are used
individually as emergency sutures when medical supplies are not
available.
2. Bullet Ant
A bite from this insect will not kill you, but you will never forget.
Ant is so named because its bite tastes like a shot and can cause the
most painful bite of any creature known to man. These ants are the
number one position on the Schmidt Sting Pain Index where it is
described as causing “waves of burning, throbbing, all-consuming pain
that continues for up to 24 hours”.
1. Anopheles mosquitoes
Mosquitoes are considered the most dangerous creature on earth as it
causes more than 300 million cases of malaria each year, resulting in
between 1 to 3 million deaths. They can also carry dengue fever,
elephantiasis, and yellow fever. They are usually active during the
night, so one way to protect yourself is to use insect repellent and
wear long sleeves.

Not only from Korea, there is also a boyband who is now on the rise.
Derived from a combination of British and Irish boy band formed in
London around 2010 ago. Who else if not ONE DIRECTION
Comprised by five cool guy and handsome, that attract many female
fans. This boyband member are Niall Horan, Zayn Malik, Liam Payne, Harry
Styles and Louis Tomlinson.
Now they have 2 albums. titled first album Up All Night was released
in November of 2011 it became the fastest selling album. As single debut
song “What Makes You Beautiful” they won Best British Single. And
recently they have launched a second album titled “Take Me Home”.
contains 17 songs. 13 singles debut and 4 other songs are bonustracks.
There are a little about One Direction. Wait for the next posts

Crime in cyberspace (cyber crime) now ranks second only to drug
crimes, in terms of the value of the benefits obtained material, and
loss and damage for the victims.

Although the news has been repeatedly broadcast by the media, lack of
public awareness seems to be an advantage for the thieves, and this is
evidenced by the fact that many people can still be stolen simply by
online tricks are simple. Some sites led you through the ins and outs of
digital implementation of the most dangerous in the world, so be
careful with your online activities.
Here are 7 great criminals in cyberspace, even though their names are pseudonyms, but they are real.
1. Kodiak
In 1994, the Kodiak access the accounts of several large corporate
customers at major banks and transfer the funds to an account that has
been set up by their accomplices in Finland, the United States, Germany,
Israel and the UK. In 2005, he was convicted and jailed for three
years. Kodiak is estimated to have stolen amounted to 10.7 million
dollars.
2. Don Fanucci
At the age of 15 years, Don Fanucci perform a series of attacks in
February 2000 against several websites high traffick commercial areas.
He was sentenced prisoners in the town where he lived, Montreal, Quebec,
on 12 September 2001 for eight months open custody, one year probation,
restrictions on use of the Internet, and fines. Damage to the global
economy as a result of his attacks are believed to reach 7.5 million to
1.2 billion dollars.
3. Pox
One of the creators of e-mail virus “Love Bug” (iloveyou), Pox, is
alleged to have infected and crippled more than 50 million computers and
networks on May 4, 2000. The virus also attacked computers owned by the
Pentagon, CIA and other large organizations and cause losses of
millions of dollars due to damage. Because the Philippines had no laws
against computer hacking crimes, Fox was never indicted for his crimes.
4. Mishkal
Mishkal accused as one of the godfathers of credit card counterfeiters
in Eastern Europe. He and partner-partner accused of mass producing fake
credit and debit cards. At one point, they reported having income up to
$ 100,000 per day. He was arrested but later released after six months
in detention, and immediately looked for a position in the government of
Ukraine – a position that would give him automatic immunity from
further prosecution.
5. The Wiz and Piotrek
The Wiz, 23, and Piotrek, 27, of Chelyabinsk, Russia, was sentenced to a
number of demands complicity, computer crimes and fraud tie against
financial institutions in Seattle, Los Angeles and Texas. Among other
things, they stole a database of about 50,000 credit cards. Both were
fined and sentenced to at least three years in prison.
6. Roper, Red_Skwyre, and Dragov
Three people are the core of a network of cyber crime to extort money
from the banks, internet casinos, and various other web-based
businesses. Their strategy is simple, namely to hack and hold the
account transactions for a $ 40,000 ransom. Indicted cause direct damage
of more than 2 million poundstarling and indirect damage of about 40
million poundstarling. In October 2007, the trio were found guilty and
sentenced to eight years in prison.
7. Bandit
Bandit manipulate roughly 500,000 computers and rent it for criminal
activities. He was arrested in November 2005 in an FBI operation, and
was sentenced to 60 months in prison and ordered to surrender a luxury
car worth 58,000 dollars from the proceeds of crime. He was also ordered
to pay $ 15,000 in compensation to the U.S. government for military
computers were infected.

Industrial district is located in the area of Malang tempeh
Sanan Malang, East Java, tempeh crisps are typical hawker native city
ofMalang are well known and in demand by many tourists who’ve been to
the city of Malang. Distinctive flavor of the processed Malang tempeh
tempeh tempeh is different from other regions processed outside Malang,
Malang tempeh therefore more acceptable and preferable especially in
processed tempenya own taste. Processed tempeh is very plentiful and
varied in the culinary world, especially for culinary Indonesia.

The making process Tempe Chips

Chips tempeh is made ​​from soybeans that is used as a staple tempeh
textured solid then cut thin, mixed with other ingredients such as rice
flour and spices such as cilantro, onion, lime, betel leaves, coconut
milk, kaffir lime leaves, as a condiment. Then fried until dry, crisp
and savory. The process of making chips is done traditionally and
without preservatives so it is safe for consumption and hygiene.

EXCESS CHIPS TEMPE MALANG:

Without the use of preservatives.

The chips are thin and crispy.

Do not use cooking oil.

Not easy to rancidity.

Good packaging and hygienic.

There are a variety of different flavors.

Weight in packing chips are available in two types ie 100 grams and
200 grams.Tempe chips packaged in plastic with thickness of 0.10 mm so
it can be durable and repackaged with cardboard when shipped out of
town.
Tempe chips consist of several different flavors including:

For anyone who likes and hobbies adventure in culinary tourism is
worth a try and taste the typical hawker Malang city, you must be
satisfied guaranteed. Let’s try and see for yourself the delights of
healthy snacks tempe chips this.

Rice is the staple food in many countries and even Indonesia is
one country that makes rice as a staple food. Speaking of rice and rice,
there is rice farming land so. Fertile rice fields irrigation system
would have to pay attention, so many terraced rice fields made
​​(terracing). In addition to making equitable distribution of water
also reduces the hazard of erosion.

Of millions of hectares of rice fields in the earth, some of which
create beautiful scenery. okay masulum.com friends, this time I will
show you some pictures of some fields that I know are very beautiful.1.Yunnan, China

2. Banaue, Filipina

3. Pulau Boracay, Filipina

4. Rishikesh, Himalaya

5. Hamanoura, Jepang

6. Machu Picchu, Peru

7. Subak, Bali

8. Cancar, Flores

I think it’s umpteen and thanks to the readers for your attention.
Wassalamualaikum Wr. wb

So far, we discern the difficulties which hackers and crackers?
Who are the hackers and crackers and it really is? he’s the info.

(English: hacker) is a study, analyze, and can modify or even exploit
the system contained in a device such as computer software (computer
programs) and computer hardware, administration and others, especially
security.
In addition, the hacker also the name for the person or group of
people who provide a useful contribution to the world of networking and
operating systems, a program for world aid and computer networks.
Hackers could also be categorized job is done to look for the weaknesses
of a system and provide ideas or opinions that can improve the
discovery of weaknesses in the system.
While the cracker is a term for people who are looking for weaknesses
in the system and entered it for personal gain and profit of the
systems in the cluster such as data theft, removal, and more.
Terminology hackers emerged in the early 1960s among the members of
student organizations Tech Model Railroad Club at the Artificial
Intelligence Laboratory of the Massachusetts Institute of Technology
(MIT). The student group is one of the pioneering developments in
computer technology and they are struggling with a mainframe computer.
The word hacker first appeared with a positive sense to refer to a
member who has expertise in the field of computers and computer programs
that are able to make better than that has been designed together.
Then in 1983, the term hacker turned into a negative. Because, in
that year for the first time the FBI caught 414s computer criminal
groups based in the U.S. Milwaukee. 414 is the area code of their local.
The group later referred to as hackers are convicted of burglary 60
computers, from computers owned by Cancer Center Memorian
Solan-Kettering’s computer to Los Alamos National Laboratory. One of
pelakuk was granted immunity because TESTIMONIALS, while five other
players get probation.
Hacker has a negative connotation because people with different terms
between hackers and crackers. Many people understand that the hackers
that resulted in loss of certain parties, such as inserting the virus
code and steal an important transaction data, and so forth.
Though they are cacker. Crackers use security holes that have not
been repaired by the manufacturer software (bug) to infiltrate and
damage a system. For this reason the hackers are usually divided into 2
groups understand White Hat Hackers the true hackers and crackers are
often referred to as Black Hat Hackers.
Now with the explanation above it can be seen where the hackers and crackers are.

Continous our trip to Yogyakarta, we definitely wanted to try
the authentic Yogyakarta dish: gudeg. We’ve read many good reviews about
Gudeg Yu Djum, so we headed to Gudeg Yu Djum restaurant on Jl Dagen
(Dagen Street) while we were browsing through Jl Malioboro. The
restaurant was not too big, and they provided chairs and tables for
diners.

We ordered one with chicken breast and egg, and another with
shredded chicken. They already ran out of tempe and tahu (tofu) by 12pm
on a Saturday. Not long after ordering, the food came since they were
all ready to serve. All orders already included gudeg (stewed young
jackfruit that tastes sweet) and krecek (spicy stewed beef skin). The
chicken breast, egg, and shredded chicken were both tender and tasted
rather sweet. The gudeg was sweeter and drier than gudeg we usually had
in Jakarta, and the krecek was hotter.

Nasi gudeg with chicken breast and egg, Rp 30k

Nasi Gudeg With Chicken Breast

Nasi gudeg with shredded chicken, Rp 8k
We liked Yu Djum’s gudeg so we actually came back to have their gudeg
again on our 3-day trip. This time, we visited their branch on Jl
Wijilan (Wijilan Street), nearby Keraton. Jl Wijilan was filled with
gudeg restaurants, and Yu Djum was the most crowded one. At this branch,
the place was much smaller. There was not any chair, they only provided
a mat for diners to sit with bare feet; or we call it ‘lesehan’. At 1pm
on a Monday, they ran out almost everything except chicken wing and
shredded chicken. So we ordered only one portion of nasi gudeg with
chicken wing.

Nasi Gudeg With Chicken Wing

Our food came, and they had a pretty consistent taste with their Jl
Dagen branch. With our luck, Yu Djum’s food truck came while we were
enjoying our first plate. Soon they were busy unloading ready-made food
in baskets covered with banana leaves. So we added another portion of
gudeg, krecek, and tofu (yay, tofu!) without the rice (yes, you can
modify your order per your liking).

Gudeg with tofu

Our total bill was Rp 39k, including drinks.
If you go to Yogyakarta you must try it.